Mozilla

Firefox

2867 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.22%
  • Veröffentlicht 22.12.2022 20:15:21
  • Zuletzt bearbeitet 15.04.2025 21:15:45

In unusual circumstances, an individual thread may outlive the thread's manager during shutdown. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox < 98.

  • EPSS 0.2%
  • Veröffentlicht 22.12.2022 20:15:20
  • Zuletzt bearbeitet 16.04.2025 15:15:49

Web-accessible extension pages (pages with a moz-extension:// scheme) were not correctly enforcing the frame-ancestors directive when it was used in the Web Extension's Content Security Policy. This vulnerability affects Firefox < 97, Thunderbird < 9...

  • EPSS 0.13%
  • Veröffentlicht 22.12.2022 20:15:20
  • Zuletzt bearbeitet 16.04.2025 15:15:49

Under certain circumstances, a JavaScript alert (or prompt) could have been shown while another website was displayed underneath it. This could have been abused to trick the user. <br>*This bug only affects Firefox for Android. Other operating system...

  • EPSS 0.15%
  • Veröffentlicht 22.12.2022 20:15:20
  • Zuletzt bearbeitet 16.04.2025 15:15:49

When a worker is shutdown, it was possible to cause script to run late in the lifecycle, at a point after where it should not be possible. This vulnerability affects Firefox < 96, Thunderbird < 91.6, and Firefox ESR < 91.6.

  • EPSS 0.18%
  • Veröffentlicht 22.12.2022 20:15:20
  • Zuletzt bearbeitet 16.04.2025 15:15:50

Mozilla developers Paul Adenot and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96 and Firefox ESR 91.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could hav...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 22.12.2022 20:15:20
  • Zuletzt bearbeitet 16.04.2025 15:15:50

An attacker could have caused a use-after-free by forcing a text reflow in an SVG object leading to a potentially exploitable crash. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7.

  • EPSS 0.12%
  • Veröffentlicht 22.12.2022 20:15:19
  • Zuletzt bearbeitet 16.04.2025 15:15:49

When clicking on a tel: link, USSD codes, specified after a <code>\*</code> character, would be included in the phone number. On certain phones, or on certain carriers, if the number was dialed this could perform actions on a user's account, similar ...

  • EPSS 0.19%
  • Veröffentlicht 22.12.2022 20:15:19
  • Zuletzt bearbeitet 16.04.2025 15:15:49

If a document created a sandboxed iframe without <code>allow-scripts</code>, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox. This ...

  • EPSS 0.25%
  • Veröffentlicht 22.12.2022 20:15:19
  • Zuletzt bearbeitet 16.04.2025 15:15:49

When importing resources using Web Workers, error messages would distinguish the difference between <code>application/javascript</code> responses and non-script responses. This could have been abused to learn information cross-origin. This vulnerabil...

  • EPSS 0.54%
  • Veröffentlicht 22.12.2022 20:15:18
  • Zuletzt bearbeitet 16.04.2025 15:15:48

By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97.